A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is
We compare the performance of our algorithm with the state of the art AFI mining algorithms on benchmark databases. ... Specifically, the article proposes novel techniques that how to map transactions on approximate FP-tree, and how to mine AFIs from the conditional patterns of approximate FP-tree. ... ing, April 20-22, 2006, Bethesda, MD, USA, 407-418. ...doi:10.5755/j01.itc.50.4.29060 fatcat:pgjvnxjekvcirf6w75bkqbhbs4
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. ... The literature has further focused on only highlighting security and privacy issues without providing adequate technical approaches to mitigate such security and privacy threats. ... In Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, Bethesda, MD, USA, 31 May–2 June 2009; Volume 9, pp. 169–178. 86. Tang, Y.; Lee, P.P.; Lui, J.C.; Perlman, R. ...doi:10.3390/fi14010011 fatcat:rzfmwfbxujcu7ohcecbqsb6p2a
the Sun's equator and its poles over a period of 17 to 22 years. ... The culmination of 20 years of planning and development, HIAPER can fly up to 51,000 feet with a range of 7,000 miles and can carry 5,600 pounds of scientific sensors. ... Forest Service Washington DC USA ESSL ACD Madronich Sasha Uymhau U National Institues of Health, MD Bethesda MD USA ESSL ACD Madronich Sasha Varela Armando Instituto Nacional de ...fatcat:edhblkkmgbd7jgtneuf66kbepy